Skip to main content

Advertisement

Log in

A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications

  • Published:
Cognitive Computation Aims and scope Submit manuscript

Abstract

Rapid advancement of Internet of Things (IoT) and cloud computing enables neuroscientists to collect multilevel and multichannel brain data to better understand brain functions, diagnose diseases, and devise treatments. To ensure secure and reliable data communication between end-to-end (E2E) devices supported by current IoT and cloud infrastructures, trust management is needed at the IoT and user ends. This paper introduces an adaptive neuro-fuzzy inference system (ANFIS) brain-inspired trust management model (TMM) to secure IoT devices and relay nodes, and to ensure data reliability. The proposed TMM utilizes both node behavioral trust and data trust, which are estimated using ANFIS, and weighted additive methods respectively, to assess the nodes trustworthiness. In contrast to existing fuzzy based TMMs, simulation results confirm the robustness and accuracy of our proposed TMM in identifying malicious nodes in the communication network. With growing usage of cloud based IoT frameworks in Neuroscience research, integrating the proposed TMM into existing infrastructure will assure secure and reliable data communication among E2E devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Mahmud M, Kaiser MS, Hussain A, Vassanelli S. 2018. Applications of deep learning and reinforcement learning to Biological Data. IEEE Trans Neural Netw Learn Syst. 2018. https://doi.org/10.1109/TNNLS.2018.2790388 [Epub ahead of print].

    Article  Google Scholar 

  2. Schadt EE, Linderman MD, Sorenson J, Lee L, Nolan GP. Computational solutions to large-scale data management and analysis. Nat Rev Genet 2010;11(9):647–657.

    Article  CAS  Google Scholar 

  3. Shahand S, Benabdelkader A, Jaghoori MM, Mourabit Ma, Huguet J, Caan MWA, et al. A data-centric neuroscience gateway: design, implementation, and experiences. Concurr Computat: Pract Exper 2015; 27(2):489–506.

    Article  Google Scholar 

  4. Landhuis E. Neuroscience: Big brain, big data. Nature. 2017;541:559–561.

    Article  CAS  Google Scholar 

  5. Sakkalis V. Applied strategies towards EEG/MEG biomarker identification in clinical and cognitive research. Biomark Med 2011;5(1):93–105.

    Article  Google Scholar 

  6. McMillan CT. Neurodegenerative disease: MRI biomarkers — a precision medicine tool in neurology? Nat Rev Neurol 2016;12(6):323–324.

    Article  CAS  Google Scholar 

  7. Liu S, Cai W, Liu S, Zhang F, Fulham M, Feng D, et al. Multimodal neuroimaging computing: a review of the applications in neuropsychiatric disorders. Brain Inf 2015;2(3):167–180.

    Article  Google Scholar 

  8. Al-jawahiri R, Milne E. Resources available for autism research in the big data era: a systematic review. Peer J 2017;5:e2880.

    Article  Google Scholar 

  9. Young AL, Oxtoby NP, Schott JM, Alexander DC. Data-driven models of neurodegenerative disease. Adv Clin Neurosci Rehabil 2014;14(5):6–9.

    Google Scholar 

  10. Burns R, Vogelstein J, Szalay A. From cosmos to connectomes: the evolution of data-intensive science. Neuron 2014;83(6):1249–1252.

    Article  CAS  Google Scholar 

  11. Mahmud M, Pulizzi R, Vasilaki E, Giugliano M. QSpike tools: a generic framework for parallel batch preprocessing of extracellular neuronal signals recorded by substrate microelectrode arrays. Front Neuroinform 2014; 8: 26. https://doi.org/10.3389/fninf.2014.00026.

    Article  Google Scholar 

  12. Mahmud M, Vassanelli S. Processing and analysis of multichannel extracellular neuronal signals: State-of-the-art and challenges. Front Neurosci 2016;10:248. https://doi.org/10.3389/fnins.2016.00248.

    PubMed  PubMed Central  Google Scholar 

  13. Neuro Cloud Consortium. To the cloud! a grassroots proposal to accelerate brain science discovery. Neuron 2016; 92(3):622– 627.

    Article  Google Scholar 

  14. Luo B, Hussain A, Mahmud M, Tang J. Advances in brain-inspired cognitive systems. Cogn Comput 2016;8(5):795–796.

    Google Scholar 

  15. Hashem IAT, Yaqoob I, Anuar NB, Mokhtar S, Gani A, Ullah Khan S. The rise of “big data” on cloud computing: Review and open research issues. Inf Syst 2015;47:98–115.

    Article  Google Scholar 

  16. Mahmud M, Travalin D, Bertoldo A, Girardi S, Maschietto M, Vassanelli S. An automated classification method for single sweep local field potentials recorded from rat barrel cortex under mechanical whisker stimulation. J Med Biol Eng 2012;32(6):397–404.

    Article  Google Scholar 

  17. Mahmud M, Bertoldo A, Girardi S, Maschietto M, Vassanelli S. SigMate: A Matlab-based automated tool for extracellular neuronal signal processing and analysis. J Neurosci Methods 2012;207(1):97–112.

    Article  Google Scholar 

  18. Mahmud M, Cecchetto C, Vassanelli S. An automated method for characterization of evoked single-trial local field potentials recorded from rat barrel cortex under mechanical whisker stimulation. Cogn Comput 2016;8(5): 935–945.

    Article  Google Scholar 

  19. Mahmud M, Rahman MM, Travalin D, Raif P, Hussain A. Service oriented architecture based web application model for collaborative biomedical signal analysis. Biomed Eng-Biomed Tech 2012;57(Sl-1):780–783. https://doi.org/10.1515/bmt-2012-4412.

    Google Scholar 

  20. Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 2017;11(1):88–95.

    Article  CAS  Google Scholar 

  21. Ullah A, Li J, Hussain A, Yang E. Towards a biologically inspired soft switching approach for cloud resource provisioning. Cogn Comput 2016;8(5):992–1005.

    Article  Google Scholar 

  22. Shabut AM, Dahal KP, Bista SK, Awan IU. Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans Mob Comput 2015;14(10):2101–2115.

    Article  Google Scholar 

  23. Shabut AM, Dahal K. Social factors for data sparsity problem of trust models in MANETs. Proceedings of the ICNC; 2017. p. 876–880.

  24. Chen D, Chang G, Sun D, Li J, Jia J, Wang X. TRM-IoT: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 2011;8:1207–1228.

    Article  Google Scholar 

  25. Marzi H, Li M. An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Comput Sci 2013;19:1159–1166.

    Article  Google Scholar 

  26. Ben Saied Y, Olivereau A, Zeghlache D, Laurent M. Trust management system design for the Internet of Things: A context-aware and multi-service approach. Comput Secur 2013;39(Part B):351–365.

    Article  Google Scholar 

  27. Dolera Tormo G, Gomez Marmol F, Martinez Perez G. Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Future Gener Comput Syst 2015;49:113–124.

    Article  Google Scholar 

  28. Fang W, Zhang C, Shi Z, Zhao Q, Shan L. BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks. J Netw Comput Appl 2016;59:88–94.

    Article  Google Scholar 

  29. Ruan Y, Durresi A, Alfantoukh L. Trust management framework for internet of things. Proceedings of the AINA; 2016. p. 1013–1019.

  30. Chen IR, Guo J, Bao F, Cho JH. Integrated social and quality of service trust management of mobile groups in ad hoc networks. Proceedings of the ICICS; 2013. p. 1–5.

  31. Zhang Y, Qiu M, Tsai CW, Hassan MM, Alamri A. Health-CPS: Healthcare cyber-physical system assisted by cloud and big data. IEEE Syst J 2017;11(1):88–95.

    Article  CAS  Google Scholar 

  32. Kaiser MS, Chowdhury ZI, Mamun SA, Hussain A, Mahmud M. A neuro-fuzzy control system based on feature extraction of surface electromyogram signal for solar-powered wheelchair. Cogn Comput 2016;8(5): 946–954.

    Article  Google Scholar 

  33. Yan Z, Zhang P, Vasilakos AV. A survey on trust management for Internet of Things. J Netw Comput Appl 2014;42:120–134.

    Article  Google Scholar 

  34. Afsana F, Jahan N, Sunny FA, Kaiser MS, Mamun SA. Trust and energy aware Cluster modeling and spectrum handoff for cognitive radio ad-hoc network. Proceedings of the ICEEICT; 2015. p. 1–6.

  35. Zhang ZX. The effects of frequency of social interaction and relationship closeness on reward allocation. J Psychol 2001;135(2):154–164.

    Article  CAS  Google Scholar 

  36. Jøsang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision. Decis Support Syst 2007;43(2):618–644.

    Article  Google Scholar 

  37. Cherry B. Entrepreneur as trust-builder: interaction frequency and relationship duration as moderators of the factors of perceived trustworthiness. Int J Bus Glob 2014;14(1):97–121.

    Article  Google Scholar 

  38. Daly EM, Haahr M. Social network analysis for information flow in disconnected delay-tolerant MANETs. IEEE Trans Mob Comput 2009;8(5):606–621.

    Article  Google Scholar 

  39. Momani M, Takruri M, Al-Hmouz R. Risk assessment algorithm in wireless sensor networks using beta distribution. CoRR 2014. arXiv:1410.3041.

  40. Liu Y, Chitawa US, Guo G, Wang X, Tan Z, Wang S. A Reputation Model for Aggregating Ratings Based on Beta Distribution Function. Proceedings of the ICCSE; 2017. p. 77–81.

  41. Josang A, Ismail R. The beta reputation system. Proceedings of the BLED; 2002. p. 324–337.

  42. Takagi T, Sugeno M. Fuzzy identification of systems and its applications to modeling and control. IEEE Trans Syst Man, Cybern 1985;SMC-15(1):116–132.

    Article  Google Scholar 

  43. Al-Hmouz A, Shen J, Al-Hmouz R, Yan J. Modeling and Simulation of an Adaptive Neuro-Fuzzy Inference System (ANFIS) for Mobile Learning. IEEE Trans Learn Technol 2012;5(3):226–237.

    Article  Google Scholar 

  44. Issariyakul T, Hossain E. Introduction to network simulator, Vol 2. Boston: Springer; 2009.

    Book  Google Scholar 

  45. Gopinath S, Nagarajan N. Energy based reliable multicast routing protocol for packet forwarding in MANET. J Appl Res Technol 2015;13(3):374–381.

    Article  Google Scholar 

  46. Kaur R, Sharma N. Dynamic node recovery for improved throughput in MANET. Proceedings of the NGCT; 2015. p. 325–330.

  47. Gupta NK, Pandey K. Trust based Ad-hoc on Demand Routing protocol for MANET. Proceedings of the IC3; 2013. p. 225–231.

  48. Talreja R, Sathish S, Nenwani K. Trust Variable Factor : A trust based method to detect misbehaving nodes in MANET. Proceedings of the ICEEOT; 2016. p. 3238–3241.

  49. Dhananjayan G, Subbiah J. T2AR: trust-aware ad-hoc routing protocol for MANET. Springer Plus 2016;5 (1):995.

    Article  Google Scholar 

  50. Ghosh S, Biswas S, Sarkar D, Sarkar PP. A novel Neuro-fuzzy classification technique for data mining. Egypt Inform J 2014;15(3):129–147.

    Article  Google Scholar 

  51. Gu Q, Zhu L, Cai Z. Computational Intelligence and Intelligent Systems. Evaluation measures of the classification performance of imbalanced data sets. Berlin: Springer; 2009. p. 461–471.

    Google Scholar 

  52. Andel TR, Yasinsac A. Adaptive threat modeling for secure Ad Hoc routing protocols. Electron Notes Theor Comput Sci 2008;197(2):3–14.

    Article  Google Scholar 

Download references

Acknowledgments

The work was supported by ACS Lab (http://www.acslab.info). The authors would like to acknowledge members of the ACS Lab for proof-reading the manuscript. Amir Hussain was supported by the UK Engineering and Physical Sciences Research Council (EPSRC) through grant numbers EP/I009310/1 and EP/M026981/1.

Author information

Authors and Affiliations

Authors

Contributions

This work was carried out in close collaboration between all co-authors. MM, MSK, MMR, MAR, and SAM first defined the research theme and contributed an early design of the system. MSK and AS further implemented and refined the system development. MM and MSK first drafted the paper and all authors edited the draft. All authors have contributed to, seen, and approved the final manuscript.

Corresponding authors

Correspondence to Mufti Mahmud or M. Shamim Kaiser.

Ethics declarations

Conflict of Interest

The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Informed Consent

As this article does not contain any studies with human participants or animals performed by any of the authors, the informed consent in not applicable.

Additional information

Mufti Mahmud and M. Shamim Kaiser are co-first authors.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mahmud, M., Kaiser, M.S., Rahman, M.M. et al. A Brain-Inspired Trust Management Model to Assure Security in a Cloud Based IoT Framework for Neuroscience Applications. Cogn Comput 10, 864–873 (2018). https://doi.org/10.1007/s12559-018-9543-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12559-018-9543-3

Keywords

Navigation